Sciweavers

3618 search results - page 119 / 724
» Enabling or disabling technologies
Sort
View
DRM
2006
Springer
14 years 29 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
IADIS
2003
13 years 10 months ago
E-Banking and the Older User: Toward an Inclusive Accessible Policy
Recent developments in information and communication technology have set in motion a revolution within the Banking sector which has resulted in a new channel for banking services ...
David Eddie
CC
2009
Springer
116views System Software» more  CC 2009»
14 years 10 months ago
A Framework for Exploring Optimization Properties
Important challenges for compiler optimization include determining what optimizations to apply, where to apply them and what is a good sequence in which to apply them. To address t...
Min Zhao, Bruce R. Childers, Mary Lou Soffa
CHI
2008
ACM
14 years 9 months ago
Evaluation of a role-based approach for customizing a complex development environment
Coarse-grained approaches to customization allow the user to enable or disable groups of features at once, rather than individual features. While this may reduce the complexity of...
Leah Findlater, Joanna McGrenere, David Modjeska
ICCD
2004
IEEE
87views Hardware» more  ICCD 2004»
14 years 6 months ago
Fetch Halting on Critical Load Misses
As the performance gap between processors and memory systems increases, the CPU spends more time stalled waiting for data from main memory. Critical long latency instructions, suc...
Nikil Mehta, Brian Singer, R. Iris Bahar, Michael ...